CONTACT
Isolation_Mode

Opening Keynote: Find A Way™

Speakers

Xccelerate-speaker--josh-linkner
Josh Linkner
Serial Entrepreneur, New York Times Bestselling Author, and Venture Capital Investor

Abstract

As we navigate a time of transition and complexity, government leaders face unprecedented challenges. Nearly 50% of decision-makers report declining confidence in their ability to lead through uncertainty. The rapid pace of change, evolving technology threats, and operational disruptions can be overwhelming. Now more than ever, public sector leaders must embrace a new approach to ensure mission success.

Renowned entrepreneur, venture capital investor, and innovation expert Josh Linkner introduces Find A Way™️, a proven five-step framework designed to help agencies and organizations cultivate ingenuity at every level. Whether the goal is enhancing resilience, strengthening cybersecurity, improving service delivery, or fostering workforce engagement, this approach provides practical strategies to drive sustainable success in government operations.

The Find A Way™️ framework emphasizes adaptability over rigidity, creativity over routine, and strategic improvisation over static planning. By adopting this model, government leaders can navigate uncertainty with confidence, remain agile in the face of disruption, and achieve their agency’s objectives with clarity and impact—regardless of external challenges.

Mainstage 1

Securing Every Identity: The Federal Blueprint for Zero Trust

Speakers

Xccelerate-speaker--Randy Resnick
Randy Resnick
Director, Zero Trust Portfolio Management Office, DOD CIO, DOD
Xccelerate-speaker--Mark Canter
Mark Canter
CISO, GAO
Xccelerate-speaker--Rahul Dubey
Rahul Dubey
VP, Global Public Sector Solutions, CyberArk
Xccelerate-speaker--Matt Tarr
Matt Tarr
SE Manager, Solutions Architecture, CyberArk
Xccelerate-speaker--Tom Suder
Tom Suder (Moderator)
ATARC

Abstract

From people to AI tools, every identity must be managed with precision. This session explores identity security solutions and their role in enforcing Zero Trust principles. Drawing insights from the federal government's approach to Zero Trust, we'll highlight how comprehensive identity management is critical to achieve agencies' goals of securing complex and diverse environments. Learn practical strategies for implementing Zero Trust principles effectively to strengthen access controls and protect federal networks.

Mainstage 2

End-to-End Resilience in the Ransomware Era: Defending Data and Mobile Endpoints

Speakers

Xccelerate-speaker--Benjamin Gilbert
Benjamin Gilbert
Supervisory Cybersecurity Advisor, Region 3, CISA
Xccelerate-speaker--Mark Bentkower
Mark Bentkower, VMCE, CISSP
Principal Technologist, Americas, Veeam Software
Xccelerate-speaker--Densmore Bartly
Densmore Bartly
CISO, U.S. House of Representatives
Xccelerate-speaker--Mike Damiano
Mike Damiano
Solutions Engineer, Zimperium
Xccelerate-speaker--Heather Kuldell
Heather Kuldell-Ware (Moderator)
Former Editor-in-Chief, GovExec

Abstract

With ransomware accounting for nearly one-third of all breaches in 2023, organizations must adopt a holistic approach to resilience. It's no longer enough to focus solely on traditional data protection; mobile endpoints now represent a critical frontier in cybersecurity. This session will explore comprehensive strategies for protecting your organization's data and mobile endpoints, strengthening defenses against ransomware, and enabling fast recovery with minimal disruption to operations. Gain insights into building a proactive, integrated defense posture that keeps your organization resilient in an ever-evolving threat landscape.

Mainstage 3

Post-Quantum Readiness: A Holistic Approach to Vulnerability and Cryptographic Risk Management

Speakers

Xccelerate-speaker--Landon Van Dyke
Landon Van Dyke
Senior Advisor, Emerging Technologies, Department of State
Xccelerate-speaker--Cherilyn Pascoe
Cherilyn Pascoe
Director, Cybersecurity Center of Excellence, NIST
Xccelerate-speaker--Taher Elgamal
Taher Elgamal
Partner, InfoSec Global
Xccelerate-speaker--Steve Orrin
Steve Orrin
Chief Technology Officer, Intel Federal
Xccelerate-speaker--Heather Kuldell
Heather Kuldell-Ware (Moderator)
Former Editor-in-Chief, GovExec

Abstract

As the quantum era approaches, enterprises must navigate dual challenges: mitigating current vulnerabilities and preparing for the shift to quantum-resistant cryptography. A critical aspect of this preparation is achieving comprehensive asset visibility—locating all endpoints, identifying assets across workloads, applications, and multi-cloud environments, and uncovering hidden vulnerabilities. Experts will discuss strategies to build a unified vulnerability management process that not only addresses M23-01 and M23-02 requirements but also ensures cryptographic resilience by replacing weak encryption algorithms. Gain insights into securing enterprise assets, enhancing endpoint discovery, and adopting quantum-safe cryptographic standards.

Mainstage 4

Next-Gen Security Operations: Continuous Visibility & Protection from On-Prem to Multi-Cloud

Speakers

Xccelerate-speaker--Ray Romano
Ray Romano
Deputy Assistant Director, Cyber Threat and Investigations, Department of State
Xccelerate-speaker--Manuel Medrano
Manuel “Manny” Medrano
Office of Cyber Monitoring and Operations, Bureau of Diplomatic Security, Department of State
Xccelerate-speaker--Alex Kreilein
Alex Kreilein
Vice President, Product Security, Qualys
Xccelerate-speaker--Rob Sherry
Rob Sherry
District Sales Manager - Federal - Next Generation Security, Palo Alto Networks
Xccelerate-speaker--Heather Kuldell
Heather Kuldell-Ware (Moderator)
Former Editor-in-Chief, GovExec

Abstract

In an era where cyber threats are increasingly sophisticated, effective cybersecurity demands advanced innovative driven solutions. Join this session to explore how to leverage innovative technologies to deliver efficient vulnerability detection, rapid threat prioritization, and proactive response across hybrid and multi-cloud environments. Learn how tools can integrate seamlessly to secure your network from on-prem data centers to the cloud, ensuring visibility, protection, and adaptability in an evolving threat landscape. Discover innovative techniques to detect vulnerabilities, mitigate risks, and simplify multi-cloud security management without overstretching resources.

Breakout Group 1A

Identity-First Security: A Comprehensive Approach to Secure All Identities

Speakers

Xccelerate-speaker--James Johnson
James Johnson
Public Sector Solutions Engineer, CyberArk
Xccelerate-speaker--Nick Curcuru
Nick Curcuru
Head of Solutions Marketing, CyberArk

Abstract

During this session, learn how identity has become the new security perimeter and how CyberArk meets today's evolving threats with a comprehensive identity security platform to secure human and machine identities. We will discuss practical ways to achieve optimal maturity for the identity pillar of Zero Trust.

Breakout Group 1B

The Zero Trust Roadmap: From Theory to Implementation

Speakers

Xccelerate-speaker--Imran Umar
Imran Umar
Vice President, Booz Allen
Xccelerate-speaker--Victoria Pillitteri
Victoria Pillitteri
Manager, Security Engineering and Risk Management Group, NIST
Xccelerate-speaker--Gerald Caron
Gerald Caron
VP of Cybersecurity, RIVA Solutions, Inc. (Formerly ITA)
Xccelerate-speaker--Mahreen Huque
Mahreen Huque
Senior Manager, Cybersecurity, EY Government Services
Xccelerate-speaker--Heather Kuldell
Heather Kuldell-Ware (Moderator)
Former Editor-in-Chief, GovExec

Abstract

Explore agencies' journey towards Zero Trust maturity, hearing directly from ZT practitioners as they offer valuable insights on their Zero Trust implementations. Hear lessons-learned on overcoming challenges and how they achieve effective Zero Trust security.

Breakout Group 1C

Cryptographic Discovery, Inventory & Posture Management

Speakers

Xccelerate-speaker--Troy Stark
Troy Stark
Head of Sales, InfoSec Global
Xccelerate-speaker--Steve Briley
Steve Briley
Solutions Architect - Federal, CyberArk

Abstract

As federal agencies advance their Zero Trust strategies, understanding and managing cryptographic assets is essential for securing data and identities. Learn how cryptographic discovery and visibility provide the foundation for Zero Trust Architecture, enabling organizations to identify vulnerabilities, mitigate risks, and ensure compliance with mandates such as M-23-02 and the Cyber EO.

Breakout Group 2A

Cisco Meraki: AI-Powered Security Operations

Speakers

Xccelerate-speaker--Seth Spergel
Seth Spergel
Managing Partner, Merlin Ventures
Xccelerate-speaker--Almog Apirion
Almog Apirion
CEO & Co-Founder, Cyolo
Xccelerate-speaker--Yossi Appleboum
Yossi Appleboum
CEO & Co-Founder, Sepio
Xccelerate-speaker--Reuven Aharoni
Reuven Aharoni
CEO & Founder, Cye Security
Xccelerate-speaker--Yair Cohen
Yair Cohen
VP Product & Co-Founder, Sentra
Xccelerate-speaker--Heather Kuldell
Heather Kuldell-Ware (Moderator)
Former Editor-in-Chief, GovExec

Abstract

Four co-founders and CEOs from early-stage cyber companies pitched their innovations to a Merlin Ventures panel of four CISOs, moderated by Merlin Ventures Managing Partner Seth Spergel. For more information about our CISO Community, please email Julie Arndorfer at jarndorfer@merlin.vc

 

Breakout Group 2B

ata Resilience: Safeguarding Your Mission-Critical Data

Speakers

Xccelerate-speaker--Neil Henderson
Grace Clement
Cortex Domain Consultant - Federal, Palo Alto Networks
Xccelerate-speaker--Neil Henderson
Neil Henderson
Sr. Systems Engineer - Federal, Veeam Software

Abstract

Safeguarding mission-critical data against cyber threats is a critical component of Data Resilience. During this session, learn how you can centralize security-related activity across your environment, including data backups. Learn how you can empower your teams through Automation + AI to respond more quickly to cyber threats, ensuring that data remains protected and resilient.

Breakout Group 2C

Transforming Security Operations with AI and Data

Speakers

Xccelerate-speaker--Deepak Badami
Deepak Badami
Principal Sales Engineer, ExtraHop
Xccelerate-speaker--Josh Brunvoll
Josh Brunvoll
Sr. Solution Engineer, Cribl

Abstract

Unifying security data enhances threat detection, accelerates incident response, and lowers operational costs by delivering actionable insights. In this session, learn how to improve SOC efficiencies and achieve compliance with mandates such as M-22-09 and M-21-31 through a unified approach of your security data.

Breakout Group 3A

Advanced Strategies for Fortifying OT and ICS Networks

Speakers

Xccelerate-speaker--Randy Benn
Randy Benn
Solutions Engineer - U.S. Federal, Claroty

Abstract

As cyber threats increasingly target operational technology (OT) and industrial control systems (ICS), agencies need deep visibility and real-time threat detection. In this session, explore how Claroty's cybersecurity platform delivers these capabilities without disrupting mission-critical operations. Learn how to apply Zero Trust principles to OT networks, and meet mandates such as BOD-23-01 and M-22-09.

Breakout Group 3B

Protecting IOT, OT and Mobile Endpoints Against Advanced Threats

Speakers

Xccelerate-speaker--Max Lewis
Max Lewis
Director of Solution Architecture, Federal Civilian, Armis
Xccelerate-speaker--Mike Damiano
Mike Damiano
Solutions Engineer, Zimperium
Xccelerate-speaker--Heather Kuldell
Heather Kuldell-Ware (Moderator)
Former Editor-in-Chief, GovExec

Abstract

We know cyber attacks are more complex than ever. How can federal agencies best safeguard IoT, OT, and mobile environments? Experts will explore best practices for implementing Zero Trust for these environments, beginning with comprehensive asset visibility and protection against a dynamic cyber threat landscape that targets these mission-critical systems.

Breakout Group 3C

Bridging the Gap: Partnerships to Secure our Critical Infrastructure

Speakers

Xccelerate-speaker--Alex Kreilein
Alex Kreilein
Vice President, Product Security, Qualys
Xccelerate-speaker--Genevieve Marquardt
Genevieve Marquardt
Cybersecurity Advisor (CSA), CISA
Xccelerate-speaker--Heather Kuldell
Heather Kuldell-Ware (Moderator)
Former Editor-in-Chief, GovExec

Abstract

Protecting critical infrastructure requires a unified approach between government and industry. Join this session for a lively discussion about successful partnerships, policy frameworks, and initiatives that enhance resilience and mitigate risks

For more info about this session or to request a demo, please email us at: zerotrust@merlincyber.com

Breakout Group 4A

Automated Crypto Discovery & Inventory

Speakers

Xccelerate-speaker--Troy Stark
Troy Stark
Head of Sales, InfoSec Global
Xccelerate-speaker--Dave Maphis
Dave Maphis
Head of Sales, InfoSec Global

Resources

Discover and Remediate Cryptographic Vulnerabilities on Your Endpoints Datasheet
Download

Abstract

Join us in this interactive Labs demonstration as we walk through a scenario of cryptographic discovery and inventory utilizing existing endpoint management tools to report cryptographic assets and comply with OMB M-23-02, Migrating to Post-Quantum Cryptography. We will demonstrate how the solution can discover unknown and malicious algorithms to protect the environment against threats like ransomware.

For more information or to access this interactive demo, please email zerotrust@merlincyber.com.

Breakout Group 4B

Ransomware Protection & Data Resiliency

Speakers

Xccelerate-speaker--Rick Friend
Rick Friend
Manager, Cybersecurity Solutions & Architecture, Merlin Cyber
Xccelerate-speaker--Chris Rainey
Chris Rainey
Cybersecurity Solutions Engineer, Merlin Cyber

Resources

Comprehensive Data Security and Resilience with Cryptographic Vulnerability Management Datasheet
Download
Machine Identity Meets Cryptographic Vulnerability Management Datasheet
Download
Protecting Against Ransomware with a Comprehensive Cybersecurity Strategy for Detection and Prevention Solution Brief
Download

Abstract

Join us in this interactive Labs demonstration where we will showcase various techniques to protect against ransomware throughout the attack chain. We will demonstrate how our solutions can effectively protect endpoints, detect threats and quickly recover data in the event of data loss.

For more information or to access this interactive demo, please email zerotrust@merlincyber.com.

Breakout Group 4C

Threat Hunting

Speakers

Xccelerate-speaker--Jeremy Newberry
Jeremy Newberry
Cybersecurity Strategist & Architect, Merlin Cyber

Resources

Proactive threat Hunting & Automated Incident Response: Strengthening Federal Cyber Resilience
Download

Abstract

Join us in this interactive Labs demonstration as we dive into a threat hunting scenario using the events, incidents and telemetry data from our previous Labs demonstrations. Using orchestration and automation, we will demonstrate how the security analyst can quickly identity threats, correlate, enrich and automate incident response.

For more information or to access this interactive demo, please email zerotrust@merlincyber.com.

 
 

For more info about the content presented at Xccelerate 2025 or to request a demo, please email us at: zerotrust@merlincyber.com